computer forensics and steganography
DESCRIPTION
Brief view on Computer Forensics and Steganography, a tool to hide data in images, video, audio etc..TRANSCRIPT
![Page 1: Computer forensics and steganography](https://reader033.vdocument.in/reader033/viewer/2022051515/54c8e6364a79593f448b456e/html5/thumbnails/1.jpg)
Computer Forensics and Steganography
Xavier Prathap. WSt. Claret College, Jalahalli
![Page 2: Computer forensics and steganography](https://reader033.vdocument.in/reader033/viewer/2022051515/54c8e6364a79593f448b456e/html5/thumbnails/2.jpg)
Overview
What is Computer Forensics? Uses of Computer Forensics. Forensic Processes. What is Steganography? Examples of Steganography in history. Classification of Steganography Techniques. Application of Steganography in Computer
Forensics. Steganography Tools.
![Page 3: Computer forensics and steganography](https://reader033.vdocument.in/reader033/viewer/2022051515/54c8e6364a79593f448b456e/html5/thumbnails/3.jpg)
Introduction to Computer Forensics
Use of Scientific knowledge for collecting, analyzing and presenting evidence to the court.
Forensics means “to bring to the court”
![Page 4: Computer forensics and steganography](https://reader033.vdocument.in/reader033/viewer/2022051515/54c8e6364a79593f448b456e/html5/thumbnails/4.jpg)
Why is Computer Forensics necessary?
Helps to ensure overall integrity and survivability of network infrastructure.
Defence-in-depth. Bad practices of computer forensics
may result in destroying of vital evidences.
![Page 5: Computer forensics and steganography](https://reader033.vdocument.in/reader033/viewer/2022051515/54c8e6364a79593f448b456e/html5/thumbnails/5.jpg)
Uses of Computer Forensics as evidence
Computer forensics has been used sincemid 1980s as evidence in the court
BTK Killer Joseph E. Duncan III Sharon Lopatka
![Page 6: Computer forensics and steganography](https://reader033.vdocument.in/reader033/viewer/2022051515/54c8e6364a79593f448b456e/html5/thumbnails/6.jpg)
Forensic Processes
Cross-drive analysis Live analysis Deleted Files Steganography
![Page 7: Computer forensics and steganography](https://reader033.vdocument.in/reader033/viewer/2022051515/54c8e6364a79593f448b456e/html5/thumbnails/7.jpg)
What is Steganography?
Art of Covered or hidden writing.
Steganography (greek word)
στεγανός
covered
γραφία
writing
![Page 8: Computer forensics and steganography](https://reader033.vdocument.in/reader033/viewer/2022051515/54c8e6364a79593f448b456e/html5/thumbnails/8.jpg)
Examples in History
Invisible ink (1st century AD - WW II) Tatoo message on head Overwrite select characters in printed type in
pencil› look for the gloss
Pin punctures in type Microdots (WW II) Newspaper clippings, knitting instructions, XOXO
signatures, report cards, …
![Page 9: Computer forensics and steganography](https://reader033.vdocument.in/reader033/viewer/2022051515/54c8e6364a79593f448b456e/html5/thumbnails/9.jpg)
Stego in Digital world
Steganography received little attention in computing
Renewed interest because of industry desire to protect copyrighted digital work› audio› images› video› Text
Detect counterfeiter, unauthorized presentation, embed key, embed author ID
Steganography ≠ Copy protection
![Page 10: Computer forensics and steganography](https://reader033.vdocument.in/reader033/viewer/2022051515/54c8e6364a79593f448b456e/html5/thumbnails/10.jpg)
Steganography Techniques
![Page 11: Computer forensics and steganography](https://reader033.vdocument.in/reader033/viewer/2022051515/54c8e6364a79593f448b456e/html5/thumbnails/11.jpg)
Null Cipher Hide message among irrelevant data Confuse the cryptoanalyst
![Page 12: Computer forensics and steganography](https://reader033.vdocument.in/reader033/viewer/2022051515/54c8e6364a79593f448b456e/html5/thumbnails/12.jpg)
Null Cipher Hide message among irrelevant data Confuse the cryptoanalyst
Big rumble in New Guinea.The war oncelebrity acts should end soon.Over fourbig ecstatic elephants replicated.
![Page 13: Computer forensics and steganography](https://reader033.vdocument.in/reader033/viewer/2022051515/54c8e6364a79593f448b456e/html5/thumbnails/13.jpg)
Null Cipher
Hide message among irrelevant data Confuse the cryptoanalyst
Big rumble in New Guinea.The war oncelebrity acts should end soon.Over fourbig ecstatic elephants replicated.
Bring two cases of beer.
![Page 14: Computer forensics and steganography](https://reader033.vdocument.in/reader033/viewer/2022051515/54c8e6364a79593f448b456e/html5/thumbnails/14.jpg)
Chaffing & Winnowing
Separate good messages from the bad ones Stream of unencoded messages with signatures
› Some signatures are bogus› Need key to test
M0M3 M1M2 M0M3 M1M2
Alice Bob
M0M3 M1M2
Irene
? ? ? ?
× × ×OK
![Page 15: Computer forensics and steganography](https://reader033.vdocument.in/reader033/viewer/2022051515/54c8e6364a79593f448b456e/html5/thumbnails/15.jpg)
Image watermarking
Spatial domain watermarking› bit flipping› color separation
Frequency domain watermarking› embed signal in select frequency bands (e.g.
high frequency areas)› apply FFT/DCT transform first
› e.g. Digimarc› watermark should alter the least perceptible
bits these are the same bits targeted by lossy image
compression software
![Page 16: Computer forensics and steganography](https://reader033.vdocument.in/reader033/viewer/2022051515/54c8e6364a79593f448b456e/html5/thumbnails/16.jpg)
DIGITAL APPROACHES
Today, it often exists within digital formats It makes use of seemingly innocent cover files
such as text, audio, and image files The embedded message may be anything that can
be encoded in binary
![Page 17: Computer forensics and steganography](https://reader033.vdocument.in/reader033/viewer/2022051515/54c8e6364a79593f448b456e/html5/thumbnails/17.jpg)
AudioPerceptual coding
› inject signal into areas that will not be detected by humans
› may be obliterated by compression
Hardware with copy-protection› not true watermarking - metadata present on media› DAT› minidisc› presence of copy protection mechanisms often failed to
give the media wide-spread acceptance
![Page 18: Computer forensics and steganography](https://reader033.vdocument.in/reader033/viewer/2022051515/54c8e6364a79593f448b456e/html5/thumbnails/18.jpg)
Video
Coding still frames - spatial or frequency
data encoded during refresh› closed captioning
visible watermarking› used by most networks (logo at bottom-
right)
![Page 19: Computer forensics and steganography](https://reader033.vdocument.in/reader033/viewer/2022051515/54c8e6364a79593f448b456e/html5/thumbnails/19.jpg)
IMAGE ATTRIBUTES
Digital images are made up of pixels The arrangement of pixels make up the image’s
“raster data” 8-bit and 24-bit images are common The larger the image size, the more information
you can hide. However, larger images may require compression to avoid detection
![Page 20: Computer forensics and steganography](https://reader033.vdocument.in/reader033/viewer/2022051515/54c8e6364a79593f448b456e/html5/thumbnails/20.jpg)
IMAGE-BASED TECHNIQUES
Least Significant Bit Insertion Masking and Filtering
![Page 21: Computer forensics and steganography](https://reader033.vdocument.in/reader033/viewer/2022051515/54c8e6364a79593f448b456e/html5/thumbnails/21.jpg)
LSB INSERTION
Replaces least significant bits with the message to be encoded
Most popular technique when dealing with images
Simple, but susceptible to lossy compression and image manipulation
![Page 22: Computer forensics and steganography](https://reader033.vdocument.in/reader033/viewer/2022051515/54c8e6364a79593f448b456e/html5/thumbnails/22.jpg)
LSB - ExampleA sample raster data for 3 pixels (9 bytes) may be:
Inserting the binaryvalue for
A (10000001
)changes
4 bits
00100111 11101000 1100100000100110 11001000 1110100011001001 00100111 11101011
00100111 11101001 1100100000100111 11001000 1110100111001000 00100111 11101011
![Page 23: Computer forensics and steganography](https://reader033.vdocument.in/reader033/viewer/2022051515/54c8e6364a79593f448b456e/html5/thumbnails/23.jpg)
MASKING & FILTERING
Masks secret data over the original data by changing the luminance of particular areas
During masking, it embed the message within significant bits of the cover image
Not susceptible to lossy techniques because image manipulation does not affect the secret message
![Page 24: Computer forensics and steganography](https://reader033.vdocument.in/reader033/viewer/2022051515/54c8e6364a79593f448b456e/html5/thumbnails/24.jpg)
MASKING & FILTERING - Uses
Digital Watermarking – provides identification pertaining to the owner; i.e. license or copyright information
- Invisible vs Visible
Fingerprinting – provides identification of the user; used to identify and track illegal use of content
![Page 25: Computer forensics and steganography](https://reader033.vdocument.in/reader033/viewer/2022051515/54c8e6364a79593f448b456e/html5/thumbnails/25.jpg)
Steganography ToolsSoftware Supporting Files Notes
BMPSecrets BMP, JPG, TIFF, GIFAllows to replace upto 50-
60% of picture with information
DarkCryptTC
BMP, JPG, TIFF, PNG, PSD, TGA, MNG, WAV,
TXT, HTML, XML, EXE, DLL
RSD mode(RNG-based random data distribution)
MP3Stego MP3 Source code provided
OpenPuffBMP, JPEG, PNG,TGA, MP3, WAV, 3fp, MP4,
MPEG-2, FLV, VOB, Pdf
256-bit multi-encryption, carrier chains, Multi-layered
obfuscation
PHP-Class StreamSteganography PNG -
Steganography Studio BMP, PNG, GIFDifferent hiding methods
included (LSC, LSC matching, SLSB, ….)
Steganographic Laboratory (VSL) BMP, PNG, JPG, TIFF Open Source
![Page 26: Computer forensics and steganography](https://reader033.vdocument.in/reader033/viewer/2022051515/54c8e6364a79593f448b456e/html5/thumbnails/26.jpg)
REFERENCES Wikipedia Exploring Steganography: Seeing the Unseen –
N. Johnson & S. Jajodia www.jjtc.com/stegdoc/steg1995.html Information Hiding: Techniques for
Steganography and Digital Watermarking” – S. Katzenbeisser, F. Petitcolas
Digital Watermarking – H. Bergel, L. O’Gorman
![Page 27: Computer forensics and steganography](https://reader033.vdocument.in/reader033/viewer/2022051515/54c8e6364a79593f448b456e/html5/thumbnails/27.jpg)
Questions?
![Page 28: Computer forensics and steganography](https://reader033.vdocument.in/reader033/viewer/2022051515/54c8e6364a79593f448b456e/html5/thumbnails/28.jpg)
Thank you
Xavier Prathap. WSt. Claret College, Jalahalli